Breadcrumb

Docker Security

Vormetric Transparent Encryption Docker Extension, from Thales eSecurity, leverages open Docker APIs and interfaces to enable policy-based encryption, access controls and data access logging for information stored within Docker containers or accessed from Docker. The result is rock solid operation, easy deployment and the protection organizations need to safely deploy production applications that use even the most sensitive information.

Poor configuration of permissions within the Docker environment or container can result in multiple containers having access to information that should remain private. Further, when Docker containers are hosted in shared virtualized or cloud environments, critical information can be exposed to third parties.

Cross-Container Access

Poor configuration of permissions within the Docker environment or container can result in multiple containers having access to information that should remain private. Further, when containers are hosted in shared virtualized or cloud environments, critical information can be exposed to third parties.

Compliance Risks

Many compliance mandates require strong controls and auditing data access. However, many security teams have limited controls available for managing and tracking access to data that’s held within Docker containers and images. As a result, these teams are finding it difficult to comply with all their relevant internal security policies and regulatory mandates.

Vormetric Data Security

Thales eSecurity delivers the strong, centrally managed data access controls you need to protect data in your Docker environments. The Docker security solution features capabilities for file and volume level encryption, access control, and logging of data access. These data access controls can be applied both to Docker containers and to the underlying operating system that is hosting Docker.

Vormetric Transparent Encryption

Vormetric Transparent Encryption is Thales’ flagship data security solution for managing file encryption and access control at the volume or operating-system level. Vormetric Transparent Encryption enables you to encrypt containers, control access to container images and instances, and ensure container images and backups only run in authorized environments.

Vormetric Transparent Encryption Docker Extension

This Docker encryption solution extends Vormetric Transparent Encryption, enabling security teams to establish controls inside of Docker containers. With this transparent encryption Docker extension, you can apply Docker encryption, access control, and data access logging on a per container basis. Encryption can be applied to data generated and stored locally within the Docker container and to data mounted in the container by network file systems.

Protect against Privileged Users

Prevent abuse by privileged insiders. Vormetric Transparent Encryption Docker Extension guards against unauthorized access to data within containers. You can even keep administrators with root privileges and other privileged users from getting to data they’re not specifically authorized to access.

Leverage Containers and Cloud, without Compromising Security.

With Vormetric Transparent Encryption Docker Extension from Thales eSecurity you can enforce your security policies in dynamic Docker environments and in multi-tenant cloud environments. As a result, the solution enables you to maximize the benefits of these approaches, without making any compromises in security.

Compliance

Address compliance requirements. Whether your organization manages sensitive payment card data, healthcare records, or other sensitive assets, you can use this solution to address the data access control requirements of all pertinent compliance mandates.

eBooks : Thales eSecurity Intel Playbook

The ever evolving landscapes in company goals & objectives make security hard. When it comes to security, the changing threat vectors can scare the most seasoned security and compliance professional. So how do we change the game? Like in any sport, a strong defense plays offense. Download the Intel Security – Vormetric Security Playbook. With these six plays, you’ll gain the strategy to keep your data safe and compliant in the battle that is constantly being waged.

As security teams struggle to contend with more frequent, costly, and sophisticated attacks, data-at-rest encryption becomes an increasingly critical safeguard. This white paper offers an overview of the different encryption approaches available today.

The Vormetric solution not only solved all of our encryption needs but alleviated any fears of the complexity and overhead of managing the environment once it was in place.Joseph Johnson,chief information security officer CHS

My concern with encryption was the overhead on user and application performance. With Thales eSecurity, people have no idea it’s even running.Karl MudraCIODelta Dental of Missouri

Vormetric’s approach of coupling access control with encryption is a very powerful combination. We use it to demonstrate to clients our commitment to preserving the security and integrity of their test cases, data and designs.David VargasInformation Security ArchitectCadence Design Systems

Implementing Vormetric has given our own clients an added level of confidence in the relationship they have with us; they know we’re serious about taking care of their data.Audley Deansenior director of Information Security,BMC Software

There is absolutely no noticeable impact on the performance or usability of applications. I am very excited at how easy the solution is to deploy and it has always performed flawlessly.Christian MuusDirector of Security for Teleperformance EMEA

Thales eSecurity is our standard. Whenever an encryption solution is needed, the answer is always, ‘let’s start with Thales eSecurity.Damian McDonaldVice President of Global Information Security, Becton, Dickinson and Company

Vormetric Encryption delivers what we need it to do – without any fuss or drama – knowing it’s in place is one less thing to worry about.Albert AvilaBusiness Solutions Specialist, Fujitsu America, Inc.